First published: Tue Sep 18 2007(Updated: )
The IA32 system call emulation functionality in Linux kernel 2.4.x and 2.6.x before 2.6.22.7, when running on the x86_64 architecture, does not zero extend the eax register after the 32bit entry path to ptrace is used, which might allow local users to gain privileges by triggering an out-of-bounds access to the system call table using the %RAX register.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/kernel | <0:2.6.18-8.1.14.el5 | 0:2.6.18-8.1.14.el5 |
Linux kernel | <=2.6.22.6 | |
Linux kernel | <=2.4.35 | |
Linux Kernel | <=2.4.35 | |
Linux Kernel | <=2.6.22.6 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
(Appears in the following advisories)
CVE-2007-4573 is classified as a high-severity vulnerability due to the potential for privilege escalation.
To mitigate CVE-2007-4573, upgrade the Linux kernel to version 2.6.22.7 or later, or apply the appropriate patches.
CVE-2007-4573 affects Linux kernel versions 2.4.x and 2.6.x prior to 2.6.22.7 running on x86_64 architecture.
An attacker exploiting CVE-2007-4573 could gain elevated privileges on a vulnerable system.
Modern Linux distributions have likely patched CVE-2007-4573, but users of legacy systems should assess their vulnerability status.